Ask Your Question

Revision history [back]

How to find which processes have initiated a connection

Apologies if this question seems foolish - I am a little out of my depth trying to track down some apparent malware that MalwareBytes, Bitdefender Total Security and other virus scans don't catch. . My DNS cache shows that something on my laptop is connecting to undesirable websites, so is there a way I can use Wireshark to identify what program (etc.) is responsible. If I sit and wait long enough, I can see the connections appearing on Wireshark, but I don't see anything informative in the packet description (example below from the first in the series).

I have tried NetStat -o to see processes associated with active connections, but none of the foreign addresses it shows are the ones I am looking for. (Maybe I was too slow and didn't catch it?) So, how can I see what is invoking the unwanted connection?

Thanks.

Frame 92580: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface \Device\NPF_{6F74599A-5AAF-47B5-9D65-43FDB69A7A36}, id 0

Section number: 1
Interface id: 0 (\Device\NPF_{6F74599A-5AAF-47B5-9D65-43FDB69A7A36})
    Interface name: \Device\NPF_{6F74599A-5AAF-47B5-9D65-43FDB69A7A36}
    Interface description: WiFi
Encapsulation type: Ethernet (1)
Arrival Time: Mar  3, 2025 14:42:13.335529000 Eastern Standard Time
UTC Arrival Time: Mar  3, 2025 19:42:13.335529000 UTC
Epoch Arrival Time: 1741030933.335529000
[Time shift for this packet: 0.000000000 seconds]
[Time delta from previous captured frame: 0.000834000 seconds]
[Time delta from previous displayed frame: 0.000000000 seconds]
[Time since reference or first frame: 872.571328000 seconds]
Frame Number: 92580
Frame Length: 66 bytes (528 bits)
Capture Length: 66 bytes (528 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: eth:ethertype:ip:tcp]
[Coloring Rule Name: TCP SYN/FIN]
[Coloring Rule String: tcp.flags & 0x02 || tcp.flags.fin == 1]

Ethernet II, Src: Intel_75:ea:90 (04:d3:b0:75:ea:90), Dst: TpLinkTechno_95:7a:a4 (d8:07:b6:95:7a:a4)

Destination: TpLinkTechno_95:7a:a4 (d8:07:b6:95:7a:a4)
    .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
    .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
Source: Intel_75:ea:90 (04:d3:b0:75:ea:90)
    .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
    .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
Type: IPv4 (0x0800)
[Stream index: 1]

Internet Protocol Version 4, Src: 192.168.68.119, Dst: 104.18.22.107

0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    0000 00.. = Differentiated Services Codepoint: Default (0)
    .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 52
Identification: 0x1d13 (7443)
010. .... = Flags: 0x2, Don't fragment
    0... .... = Reserved bit: Not set
    .1.. .... = Don't fragment: Set
    ..0. .... = More fragments: Not set
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 128
Protocol: TCP (6)
Header Checksum: 0x5a14 [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.68.119
Destination Address: 104.18.22.107
[Stream index: 15]

Transmission Control Protocol, Src Port: 52631, Dst Port: 443, Seq: 0, Len: 0

Source Port: 52631
Destination Port: 443
[Stream index: 1]
[Stream Packet Number: 1]
[Conversation completeness: Complete, WITH_DATA (31)]
    ..0. .... = RST: Absent
    ...1 .... = FIN: Present
    .... 1... = Data: Present
    .... .1.. = ACK: Present
    .... ..1. = SYN-ACK: Present
    .... ...1 = SYN: Present
    [Completeness Flags: ·FDASS]
[TCP Segment Len: 0]
Sequence Number: 0    (relative sequence number)
Sequence Number (raw): 2378963573
[Next Sequence Number: 1    (relative sequence number)]
Acknowledgment Number: 0
Acknowledgment number (raw): 0
1000 .... = Header Length: 32 bytes (8)
Flags: 0x002 (SYN)
    000. .... .... = Reserved: Not set
    ...0 .... .... = Accurate ECN: Not set
    .... 0... .... = Congestion Window Reduced: Not set
    .... .0.. .... = ECN-Echo: Not set
    .... ..0. .... = Urgent: Not set
    .... ...0 .... = Acknowledgment: Not set
    .... .... 0... = Push: Not set
    .... .... .0.. = Reset: Not set
    .... .... ..1. = Syn: Set
        [Expert Info (Chat/Sequence): Connection establish request (SYN): server port 443]
            [Connection establish request (SYN): server port 443]
            [Severity level: Chat]
            [Group: Sequence]
    .... .... ...0 = Fin: Not set
    [TCP Flags: ··········S·]
Window: 64240
[Calculated window size: 64240]
Checksum: 0x78ee [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), Maximum segment size, No-Operation (NOP), Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted
    TCP Option - Maximum segment size: 1460 bytes
        Kind: Maximum Segment Size (2)
        Length: 4
        MSS Value: 1460
    TCP Option - No-Operation (NOP)
        Kind: No-Operation (1)
    TCP Option - Window scale: 8 (multiply by 256)
        Kind: Window Scale (3)
        Length: 3
        Shift count: 8
        [Multiplier: 256]
    TCP Option - No-Operation (NOP)
        Kind: No-Operation (1)
    TCP Option - No-Operation (NOP)
        Kind: No-Operation (1)
    TCP Option - SACK permitted
        Kind: SACK Permitted (4)
        Length: 2
[Timestamps]
    [Time since first frame in this TCP stream: 0.000000000 seconds]
    [Time since previous frame in this TCP stream: 0.000000000 seconds]

How to find which processes have initiated a connection

Apologies if this question seems foolish - I am a little out of my depth trying to track down some apparent malware that MalwareBytes, Bitdefender Total Security and other virus scans don't catch. . catch.

My DNS cache shows that something on my laptop is connecting to undesirable websites, so is there a way I can use Wireshark to identify what program (etc.) is responsible. If I sit and wait long enough, I can see the connections appearing on Wireshark, but I don't see anything informative in the packet description (example below from the first in the series).

I have tried NetStat -o -b to see processes associated with active connections, but none of the foreign addresses it shows are the ones I am looking for. (Maybe I was too slow and didn't catch it?) So, how can I see what is invoking the unwanted connection?

Thanks.

[Edit - typs]

Frame 92580: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface \Device\NPF_{6F74599A-5AAF-47B5-9D65-43FDB69A7A36}, id 0

Section number: 1
Interface id: 0 (\Device\NPF_{6F74599A-5AAF-47B5-9D65-43FDB69A7A36})
    Interface name: \Device\NPF_{6F74599A-5AAF-47B5-9D65-43FDB69A7A36}
    Interface description: WiFi
Encapsulation type: Ethernet (1)
Arrival Time: Mar  3, 2025 14:42:13.335529000 Eastern Standard Time
UTC Arrival Time: Mar  3, 2025 19:42:13.335529000 UTC
Epoch Arrival Time: 1741030933.335529000
[Time shift for this packet: 0.000000000 seconds]
[Time delta from previous captured frame: 0.000834000 seconds]
[Time delta from previous displayed frame: 0.000000000 seconds]
[Time since reference or first frame: 872.571328000 seconds]
Frame Number: 92580
Frame Length: 66 bytes (528 bits)
Capture Length: 66 bytes (528 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: eth:ethertype:ip:tcp]
[Coloring Rule Name: TCP SYN/FIN]
[Coloring Rule String: tcp.flags & 0x02 || tcp.flags.fin == 1]

Ethernet II, Src: Intel_75:ea:90 (04:d3:b0:75:ea:90), Dst: TpLinkTechno_95:7a:a4 (d8:07:b6:95:7a:a4)

Destination: TpLinkTechno_95:7a:a4 (d8:07:b6:95:7a:a4)
    .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
    .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
Source: Intel_75:ea:90 (04:d3:b0:75:ea:90)
    .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
    .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
Type: IPv4 (0x0800)
[Stream index: 1]

Internet Protocol Version 4, Src: 192.168.68.119, Dst: 104.18.22.107

0100 .... = Version: 4
.... 0101 = Header Length: 20 bytes (5)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
    0000 00.. = Differentiated Services Codepoint: Default (0)
    .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
Total Length: 52
Identification: 0x1d13 (7443)
010. .... = Flags: 0x2, Don't fragment
    0... .... = Reserved bit: Not set
    .1.. .... = Don't fragment: Set
    ..0. .... = More fragments: Not set
...0 0000 0000 0000 = Fragment Offset: 0
Time to Live: 128
Protocol: TCP (6)
Header Checksum: 0x5a14 [validation disabled]
[Header checksum status: Unverified]
Source Address: 192.168.68.119
Destination Address: 104.18.22.107
[Stream index: 15]

Transmission Control Protocol, Src Port: 52631, Dst Port: 443, Seq: 0, Len: 0

Source Port: 52631
Destination Port: 443
[Stream index: 1]
[Stream Packet Number: 1]
[Conversation completeness: Complete, WITH_DATA (31)]
    ..0. .... = RST: Absent
    ...1 .... = FIN: Present
    .... 1... = Data: Present
    .... .1.. = ACK: Present
    .... ..1. = SYN-ACK: Present
    .... ...1 = SYN: Present
    [Completeness Flags: ·FDASS]
[TCP Segment Len: 0]
Sequence Number: 0    (relative sequence number)
Sequence Number (raw): 2378963573
[Next Sequence Number: 1    (relative sequence number)]
Acknowledgment Number: 0
Acknowledgment number (raw): 0
1000 .... = Header Length: 32 bytes (8)
Flags: 0x002 (SYN)
    000. .... .... = Reserved: Not set
    ...0 .... .... = Accurate ECN: Not set
    .... 0... .... = Congestion Window Reduced: Not set
    .... .0.. .... = ECN-Echo: Not set
    .... ..0. .... = Urgent: Not set
    .... ...0 .... = Acknowledgment: Not set
    .... .... 0... = Push: Not set
    .... .... .0.. = Reset: Not set
    .... .... ..1. = Syn: Set
        [Expert Info (Chat/Sequence): Connection establish request (SYN): server port 443]
            [Connection establish request (SYN): server port 443]
            [Severity level: Chat]
            [Group: Sequence]
    .... .... ...0 = Fin: Not set
    [TCP Flags: ··········S·]
Window: 64240
[Calculated window size: 64240]
Checksum: 0x78ee [unverified]
[Checksum Status: Unverified]
Urgent Pointer: 0
Options: (12 bytes), Maximum segment size, No-Operation (NOP), Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted
    TCP Option - Maximum segment size: 1460 bytes
        Kind: Maximum Segment Size (2)
        Length: 4
        MSS Value: 1460
    TCP Option - No-Operation (NOP)
        Kind: No-Operation (1)
    TCP Option - Window scale: 8 (multiply by 256)
        Kind: Window Scale (3)
        Length: 3
        Shift count: 8
        [Multiplier: 256]
    TCP Option - No-Operation (NOP)
        Kind: No-Operation (1)
    TCP Option - No-Operation (NOP)
        Kind: No-Operation (1)
    TCP Option - SACK permitted
        Kind: SACK Permitted (4)
        Length: 2
[Timestamps]
    [Time since first frame in this TCP stream: 0.000000000 seconds]
    [Time since previous frame in this TCP stream: 0.000000000 seconds]
click to hide/show revision 3
None

How to find which processes have initiated a connection

Apologies if this question seems foolish - I am a little out of my depth trying to track down some apparent malware that MalwareBytes, Bitdefender Total Security and other virus scans don't catch.

My DNS cache shows that something on my laptop is connecting to undesirable websites, so is there a way I can use Wireshark to identify what program (etc.) is responsible. If I sit and wait long enough, I can see the connections appearing on Wireshark, but I don't see anything informative in the packet description (example below from the first in the series).

I have tried NetStat -b to see processes associated with active connections, but none of the foreign addresses it shows are the ones I am looking for. (Maybe I was too slow and didn't catch it?) So, how can I see what is invoking the unwanted connection?

Thanks.

[Edit - typs]

Frame 92580: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface \Device\NPF_{6F74599A-5AAF-47B5-9D65-43FDB69A7A36}, id 0

0
    Section number: 1
 Interface id: 0 (\Device\NPF_{6F74599A-5AAF-47B5-9D65-43FDB69A7A36})
     Interface name: \Device\NPF_{6F74599A-5AAF-47B5-9D65-43FDB69A7A36}
     Interface description: WiFi
 Encapsulation type: Ethernet (1)
 Arrival Time: Mar  3, 2025 14:42:13.335529000 Eastern Standard Time
 UTC Arrival Time: Mar  3, 2025 19:42:13.335529000 UTC
 Epoch Arrival Time: 1741030933.335529000
 [Time shift for this packet: 0.000000000 seconds]
 [Time delta from previous captured frame: 0.000834000 seconds]
 [Time delta from previous displayed frame: 0.000000000 seconds]
 [Time since reference or first frame: 872.571328000 seconds]
 Frame Number: 92580
 Frame Length: 66 bytes (528 bits)
 Capture Length: 66 bytes (528 bits)
 [Frame is marked: False]
 [Frame is ignored: False]
 [Protocols in frame: eth:ethertype:ip:tcp]
 [Coloring Rule Name: TCP SYN/FIN]
 [Coloring Rule String: tcp.flags & 0x02 || tcp.flags.fin == 1]

Ethernet II, Src: Intel_75:ea:90 (04:d3:b0:75:ea:90), Dst: TpLinkTechno_95:7a:a4 (d8:07:b6:95:7a:a4)

(d8:07:b6:95:7a:a4)
    Destination: TpLinkTechno_95:7a:a4 (d8:07:b6:95:7a:a4)
     .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
     .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
 Source: Intel_75:ea:90 (04:d3:b0:75:ea:90)
     .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
     .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
 Type: IPv4 (0x0800)
 [Stream index: 1]

Internet Protocol Version 4, Src: 192.168.68.119, Dst: 104.18.22.107

104.18.22.107
    0100 .... = Version: 4
 .... 0101 = Header Length: 20 bytes (5)
 Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
     0000 00.. = Differentiated Services Codepoint: Default (0)
     .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
 Total Length: 52
 Identification: 0x1d13 (7443)
 010. .... = Flags: 0x2, Don't fragment
     0... .... = Reserved bit: Not set
     .1.. .... = Don't fragment: Set
     ..0. .... = More fragments: Not set
 ...0 0000 0000 0000 = Fragment Offset: 0
 Time to Live: 128
 Protocol: TCP (6)
 Header Checksum: 0x5a14 [validation disabled]
 [Header checksum status: Unverified]
 Source Address: 192.168.68.119
 Destination Address: 104.18.22.107
 [Stream index: 15]

Transmission Control Protocol, Src Port: 52631, Dst Port: 443, Seq: 0, Len: 0

0
    Source Port: 52631
 Destination Port: 443
 [Stream index: 1]
 [Stream Packet Number: 1]
 [Conversation completeness: Complete, WITH_DATA (31)]
     ..0. .... = RST: Absent
     ...1 .... = FIN: Present
     .... 1... = Data: Present
     .... .1.. = ACK: Present
     .... ..1. = SYN-ACK: Present
     .... ...1 = SYN: Present
     [Completeness Flags: ·FDASS]
 [TCP Segment Len: 0]
 Sequence Number: 0    (relative sequence number)
 Sequence Number (raw): 2378963573
 [Next Sequence Number: 1    (relative sequence number)]
 Acknowledgment Number: 0
 Acknowledgment number (raw): 0
 1000 .... = Header Length: 32 bytes (8)
 Flags: 0x002 (SYN)
     000. .... .... = Reserved: Not set
     ...0 .... .... = Accurate ECN: Not set
     .... 0... .... = Congestion Window Reduced: Not set
     .... .0.. .... = ECN-Echo: Not set
     .... ..0. .... = Urgent: Not set
     .... ...0 .... = Acknowledgment: Not set
     .... .... 0... = Push: Not set
     .... .... .0.. = Reset: Not set
     .... .... ..1. = Syn: Set
         [Expert Info (Chat/Sequence): Connection establish request (SYN): server port 443]
             [Connection establish request (SYN): server port 443]
             [Severity level: Chat]
             [Group: Sequence]
     .... .... ...0 = Fin: Not set
     [TCP Flags: ··········S·]
 Window: 64240
 [Calculated window size: 64240]
 Checksum: 0x78ee [unverified]
 [Checksum Status: Unverified]
 Urgent Pointer: 0
 Options: (12 bytes), Maximum segment size, No-Operation (NOP), Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted
     TCP Option - Maximum segment size: 1460 bytes
         Kind: Maximum Segment Size (2)
         Length: 4
         MSS Value: 1460
     TCP Option - No-Operation (NOP)
         Kind: No-Operation (1)
     TCP Option - Window scale: 8 (multiply by 256)
         Kind: Window Scale (3)
         Length: 3
         Shift count: 8
         [Multiplier: 256]
     TCP Option - No-Operation (NOP)
         Kind: No-Operation (1)
     TCP Option - No-Operation (NOP)
         Kind: No-Operation (1)
     TCP Option - SACK permitted
         Kind: SACK Permitted (4)
         Length: 2
 [Timestamps]
     [Time since first frame in this TCP stream: 0.000000000 seconds]
     [Time since previous frame in this TCP stream: 0.000000000 seconds]

How to find which processes have initiated a connection

Apologies if this question seems foolish - I am a little out of my depth trying to track down some apparent malware that MalwareBytes, Bitdefender Total Security and other virus scans don't catch.

My DNS cache shows that something on my laptop is connecting to undesirable websites, so is there a way I can use Wireshark to identify what program (etc.) is responsible. If I sit and wait long enough, I can see the connections appearing on Wireshark, but I don't see anything informative in the packet description (example below from the first in the series).

I have tried NetStat -b to see processes associated with active connections, but none of the foreign addresses it shows are the ones I am looking for. (Maybe I was too slow and didn't catch it?) So, how can I see what is invoking the unwanted connection?

Thanks.

[Edit - typs]typos]

Frame 92580: 66 bytes on wire (528 bits), 66 bytes captured (528 bits) on interface \Device\NPF_{6F74599A-5AAF-47B5-9D65-43FDB69A7A36}, id 0
    Section number: 1
    Interface id: 0 (\Device\NPF_{6F74599A-5AAF-47B5-9D65-43FDB69A7A36})
        Interface name: \Device\NPF_{6F74599A-5AAF-47B5-9D65-43FDB69A7A36}
        Interface description: WiFi
    Encapsulation type: Ethernet (1)
    Arrival Time: Mar  3, 2025 14:42:13.335529000 Eastern Standard Time
    UTC Arrival Time: Mar  3, 2025 19:42:13.335529000 UTC
    Epoch Arrival Time: 1741030933.335529000
    [Time shift for this packet: 0.000000000 seconds]
    [Time delta from previous captured frame: 0.000834000 seconds]
    [Time delta from previous displayed frame: 0.000000000 seconds]
    [Time since reference or first frame: 872.571328000 seconds]
    Frame Number: 92580
    Frame Length: 66 bytes (528 bits)
    Capture Length: 66 bytes (528 bits)
    [Frame is marked: False]
    [Frame is ignored: False]
    [Protocols in frame: eth:ethertype:ip:tcp]
    [Coloring Rule Name: TCP SYN/FIN]
    [Coloring Rule String: tcp.flags & 0x02 || tcp.flags.fin == 1]
Ethernet II, Src: Intel_75:ea:90 (04:d3:b0:75:ea:90), Dst: TpLinkTechno_95:7a:a4 (d8:07:b6:95:7a:a4)
    Destination: TpLinkTechno_95:7a:a4 (d8:07:b6:95:7a:a4)
        .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
        .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
    Source: Intel_75:ea:90 (04:d3:b0:75:ea:90)
        .... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)
        .... ...0 .... .... .... .... = IG bit: Individual address (unicast)
    Type: IPv4 (0x0800)
    [Stream index: 1]
Internet Protocol Version 4, Src: 192.168.68.119, Dst: 104.18.22.107
    0100 .... = Version: 4
    .... 0101 = Header Length: 20 bytes (5)
    Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
        0000 00.. = Differentiated Services Codepoint: Default (0)
        .... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)
    Total Length: 52
    Identification: 0x1d13 (7443)
    010. .... = Flags: 0x2, Don't fragment
        0... .... = Reserved bit: Not set
        .1.. .... = Don't fragment: Set
        ..0. .... = More fragments: Not set
    ...0 0000 0000 0000 = Fragment Offset: 0
    Time to Live: 128
    Protocol: TCP (6)
    Header Checksum: 0x5a14 [validation disabled]
    [Header checksum status: Unverified]
    Source Address: 192.168.68.119
    Destination Address: 104.18.22.107
    [Stream index: 15]
Transmission Control Protocol, Src Port: 52631, Dst Port: 443, Seq: 0, Len: 0
    Source Port: 52631
    Destination Port: 443
    [Stream index: 1]
    [Stream Packet Number: 1]
    [Conversation completeness: Complete, WITH_DATA (31)]
        ..0. .... = RST: Absent
        ...1 .... = FIN: Present
        .... 1... = Data: Present
        .... .1.. = ACK: Present
        .... ..1. = SYN-ACK: Present
        .... ...1 = SYN: Present
        [Completeness Flags: ·FDASS]
    [TCP Segment Len: 0]
    Sequence Number: 0    (relative sequence number)
    Sequence Number (raw): 2378963573
    [Next Sequence Number: 1    (relative sequence number)]
    Acknowledgment Number: 0
    Acknowledgment number (raw): 0
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x002 (SYN)
        000. .... .... = Reserved: Not set
        ...0 .... .... = Accurate ECN: Not set
        .... 0... .... = Congestion Window Reduced: Not set
        .... .0.. .... = ECN-Echo: Not set
        .... ..0. .... = Urgent: Not set
        .... ...0 .... = Acknowledgment: Not set
        .... .... 0... = Push: Not set
        .... .... .0.. = Reset: Not set
        .... .... ..1. = Syn: Set
            [Expert Info (Chat/Sequence): Connection establish request (SYN): server port 443]
                [Connection establish request (SYN): server port 443]
                [Severity level: Chat]
                [Group: Sequence]
        .... .... ...0 = Fin: Not set
        [TCP Flags: ··········S·]
    Window: 64240
    [Calculated window size: 64240]
    Checksum: 0x78ee [unverified]
    [Checksum Status: Unverified]
    Urgent Pointer: 0
    Options: (12 bytes), Maximum segment size, No-Operation (NOP), Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted
        TCP Option 

[Edit 2 - Maximum segment size: 1460 bytes Kind: Maximum Segment Size (2) Length: 4 MSS Value: 1460 TCP Option - No-Operation (NOP) Kind: No-Operation (1) TCP Option - Window scale: 8 (multiply by 256) Kind: Window Scale (3) Length: 3 Shift count: 8 [Multiplier: 256] TCP Option - No-Operation (NOP) Kind: No-Operation (1) TCP Option - No-Operation (NOP) Kind: No-Operation (1) TCP Option - SACK permitted Kind: SACK Permitted (4) Length: 2 [Timestamps] [Time since first frame in this TCP stream: 0.000000000 seconds] [Time since previous frame in this TCP stream: 0.000000000 seconds]

removed Wireshark output]